CVE-2013-4409: Improper Input Validation
(updated )
An eval() vulnerability exists in Python Software Foundation Djblets 0.7.21 and Beanbag Review Board before 1.7.15 when parsing JSON requests.
References
- lists.fedoraproject.org/pipermail/package-announce/2013-November/120619.html
- lists.fedoraproject.org/pipermail/package-announce/2013-October/119819.html
- lists.fedoraproject.org/pipermail/package-announce/2013-October/119820.html
- lists.fedoraproject.org/pipermail/package-announce/2013-October/119830.html
- lists.fedoraproject.org/pipermail/package-announce/2013-October/119831.html
- www.securityfocus.com/bid/63029
- access.redhat.com/security/cve/cve-2013-4409
- bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4409
- exchange.xforce.ibmcloud.com/vulnerabilities/88059
- github.com/advisories/GHSA-58h8-44mg-r43x
- github.com/djblets/djblets/blob/release-0.7.19/NEWS
- nvd.nist.gov/vuln/detail/CVE-2013-4409
- security-tracker.debian.org/tracker/CVE-2013-4409
- www.reviewboard.org/docs/releasenotes/reviewboard/1.7.15/
Detect and mitigate CVE-2013-4409 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →